Confusion and Deception: New Tools for Data Protection

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce the value of any data ultimately accessed—and shift the risk equation.

Speakers :

Craig Astrich, Daniel Frank

Craig Astrich is a Director in Deloitte’s Cyber Risk Services practice, specializing in attack pattern analysis and cyber-analytics. He has led cyber-teams across federal defense and civilian agencies, and develops capabilities in exploitation methods and weaknesses for embedded device security, computer network defense/operations (CND/CNO), security automation, mobile security and cyber-program management. He has a master’s from Johns Hopkins and a bachelor’s in engineering from Lehigh University. Astrich speaks frequently to a wide range of business and technical audiences, across a variety of industries.

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.